Terminal authentication information extraction and verification method and system based on national cryptographic algorithm
A terminal authentication and national secret algorithm technology, applied in the field of terminal authentication, can solve the problems of terminal forgery, single system protection means and protection targets, data tampering, etc., and achieve the effect of preventing tampering, resisting static analysis and reverse attack
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] This embodiment provides a method for extracting and verifying terminal authentication information based on a national secret algorithm;
[0027] Such as figure 1 As shown, the terminal authentication information extraction and verification method based on the national secret algorithm includes:
[0028] S1: Obtain a terminal authentication information file; acquire terminal authentication information from the terminal authentication information file;
[0029] S2: sequentially determine whether the serial number in the terminal authentication information is successfully read, determine whether the verification information is successfully read, and determine whether the verification value of the data segment is successfully verified;
[0030] S3: If the above judgment results are all successful, decrypt the data, re-encrypt the data, output the re-encrypted data, and restore the re-encrypted data.
[0031] A method for extracting and verifying terminal authentication i...
Embodiment 2
[0259] This embodiment provides a terminal authentication information extraction and verification system based on the national secret algorithm;
[0260] Terminal authentication information extraction and verification system based on national secret algorithm, including:
[0261] An acquisition module configured to: acquire a terminal authentication information file; acquire terminal authentication information from the terminal authentication information file;
[0262] The judging module is configured to: sequentially judge whether the serial number in the terminal authentication information is successfully read, judge whether the verification information is read successfully, and judge whether the verification value of the data segment is successfully verified;
[0263] The recovery module is configured to: if the above judgment results are all successful, decrypt the data, re-encrypt the data, output the re-encrypted data, and restore the re-encrypted data.
[0264] What ne...
Embodiment 3
[0268] This embodiment also provides an electronic device, including: one or more processors, one or more memories, and one or more computer programs; wherein, the processor is connected to the memory, and the one or more computer programs are programmed Stored in the memory, when the electronic device is running, the processor executes one or more computer programs stored in the memory, so that the electronic device executes the method described in Embodiment 1 above.
[0269] It should be understood that in this embodiment, the processor can be a central processing unit CPU, and the processor can also be other general-purpose processors, digital signal processors DSP, application specific integrated circuits ASIC, off-the-shelf programmable gate array FPGA or other programmable logic devices , discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
